Latest Resources

The old ways of implementing security and compliance mandates are no longer acceptable and the risk of high profile breaches has never been greater. With increased pressure on budgets, fewer resources and increasingly frequent audits, you need to find new ways to close security loopholes and reduce the window of vulnerability, speed remediation, and reduce the time and effort required to remain compliant.

2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

Security is an important factor regarding cloud computing. However, organizations well versed in cloud technologies find it's no longer a valid excuse for staying out of the cloud. This white paper covers the top nine threats of cloud computing. It also addresses their implications to enterprise security and offers possible solutions to avoid each threat.

As the CIO whose diverse responsibilities include budget control, cost avoidance, risk mitigation, data management, and maintaining operational excellence, email archiving may not always be top of mind. Until something goes wrong. A robust, enterprise-class email archiving solution can provide the search, eDiscovery, and efficiency you must have to support your organization's business goals. This CIO Spotlight technology brief examines three areas where an advanced email archive delivers true business value …

Globalscape's Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This white paper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.

"Facilitating Enterprise Compliance with Globalscape® EFT™ and the High-Security Module " is the property of …

The Log Management industry was traditionally driven by regulatory compliance and security concerns resulting in a multi-billion dollar market focused on security and information event management (SIEM) solutions. However, log management has evolved into a market that is focused on both the management and analytics of log data. Log management technologies are becoming more powerful and dynamic, allowing for data to be easily extracted and analyzed from logs for a much wider range of use cases. For example, …

Strengthen application protection--from design to deployment--to proactively address cloud security risks. This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.

The threats to website security can be divided into two main
groups: those that arise from criminals and software vulnerabilities. While vulnerabilities affect us all, criminals pick and choose their targets.

Attend this live eSeminar to better understand how criminals choose their targets and for an expert discussion of how vulnerabilities and criminals work hand-in-hand to compromise security. Today's businesses need to protect …

Consumers consume tons of data, but having access to that data isn't enough – it needs to be presented in an understandable and digestable way. Visualizations, if done right, have the ability to tell a story through the images by directing users towards conclusions about their data and empowering them to make a decisions based on that. But where do you start? You start first with the basics provided in this eBook.